9.4 C
Munich
Wednesday, September 27, 2023
- Advertisement -

TAG

Vulnerability

Microsoft Addresses 74 Software Vulnerabilities in August 2023 Update Cycle

In its recent effort to enhance digital security, Microsoft has taken action to rectify a total of 74 vulnerabilities present in its software through...

Chrome Security Update: 17 New Security Fixes

Google has published a security update for Chrome, updating the Stable channel for Mac and Linux to 115.0.5790.170 and 115.0.5790.170/.171 for Windows.  The release of...

Spyware App Compromised Over 60,000 Android Devices to Steal Sensitive Data

A dangerous spyware application called "Spyhide" has targeted and compromised over 60,000 Android devices worldwide, allowing the attackers to steal sensitive data from unsuspecting...

Splunk Vulnerability May Allow Attackers To Execute Malicious Code

Splunk, a leading security solution, has recently uncovered a critical vulnerability within its powerful Security Orchestration, Automation, and Response (SOAR) application. This flaw, known...

DDoS Botnets Exploiting Critical Flaw in Zyxel Devices Worldwide

Multiple DDoS Botnets Target Zyxel Devices, Experts Warn Security researchers at Fortinet FortiGuard Labs have issued a serious warning about the increasing threat posed by...

Microsoft Patches Zero-Day Vulnerabilities And Addresses Issues With Signed Drivers Being Used Maliciously

On this recent Patch Tuesday, Microsoft released a significant number of security patches for July 2023. With more than 100 vulnerabilities addressed, including four...

CISA Issues Warnings as New Vulnerabilities in MOVEit Software Expose Sensitive Information

The federal government issues a strong warning about three recently discovered vulnerabilities in the popular MOVEit file transfer software. These vulnerabilities have played a...

Critical Flaw in Fortinet Firewalls Exposes SSL VPN Interfaces: Over 490,000 Devices Vulnerable

A recent report reveals a critical flaw in Fortinet firewalls, leaving over 490,000 devices at risk of exploitation. This article explores the vulnerability, its...

Half of EDR Tools, Organizations Vulnerable to Clop Ransomware, Research Says

In recent assessments conducted by cybersecurity company Cymulate, it was revealed that nearly half of the endpoint detection and response (EDR) tools and organizations...

Chinese Hacking Group Linked to Zero-Day Exploitation of Fortinet FortiOS Security Flaw

Threat intelligence firm Mandiant has attributed the zero-day exploitation of a medium-severity security flaw in the Fortinet FortiOS operating system to a suspected Chinese...

Latest news

- Advertisement -